<--- Back to Details
First PageDocument Content
Computing / Internet / Network architecture / File sharing / Computer networking / Distributed computing architecture / Overlay network / Routing / Round-trip delay time / Peer-to-peer / Sybil attack / Tor
Date: 2011-08-15 19:32:41
Computing
Internet
Network architecture
File sharing
Computer networking
Distributed computing architecture
Overlay network
Routing
Round-trip delay time
Peer-to-peer
Sybil attack
Tor

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Add to Reading List

Source URL: www.cs.okstate.edu

Download Document from Source Website

File Size: 109,20 KB

Share Document on Facebook

Similar Documents

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

DocID: 1qTuT - View Document

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal  Krishna P. Gummadi

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

DocID: 1pGTf - View Document

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

DocID: 1pqPT - View Document

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

DocID: 1ozfr - View Document

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

DocID: 1ooNd - View Document